System Security Plan (ssp) Categorization: Moderate-Low-Low



Yüklə 1,92 Mb.
səhifə18/29
tarix16.05.2018
ölçüsü1,92 Mb.
#50588
1   ...   14   15   16   17   18   19   20   21   ...   29

10.15Maintenance (MA)

10.15.1MA-1 – System Maintenance Policy and Procedures


Program-specific policies and procedures shall be included in the specific security controls listed below. There is no requirement for the Program to develop additional policy to meet the -1 control.

10.15.2MA-2 – Controlled Maintenance


Recommended Continuous Monitoring Frequency: Annual

Program Frequency:

Choose an item.

Implementation Status:

 Implemented  Planned

Organizational Tailoring:

 Compensatory Control (Provide justification below)  Tailored In (Provide justification below)

 Tailored Out (Provide justification below)  Modified (Provide justification below)


Control Origination (check all that apply):

 Common  System Specific  Hybrid (Common and System Specific)



IS are particularly vulnerable to security threats during maintenance activities. The level of risk is directly associated with the maintenance person’s clearance and access status. A maintenance person may be uncleared or may not be cleared to the level of classified information contained on the IS. Properly cleared personnel working in the area must maintain a high level of security awareness at all times during IS maintenance activities. Reference MA-5(1) for escort requirements.

All maintenance activities should be performed on-site whenever possible. Removal of an IS or system components from a facility for maintenance or repairs requires approval coordination with the individual responsible for changes to the system, e.g., ISSM/ISSO and the individual who approves removal of equipment from the facility.

Any maintenance changes that impact the security of the system shall receive a configuration management review and documentation update, as appropriate [MA-2.e]. See also [CM-3].

Organizations shall record all information system repairs and maintenance activity in a maintenance log for the life of the IS and retain the log for a minimum of one (1) year after equipment decommissioning or disposal.

The organization:


Schedules, performs, documents, and reviews records of maintenance and repairs on information system components in accordance with manufacturer or vendor specifications and/or organizational requirements

Click here to enter text.



Approves and monitors all maintenance activities, whether performed on site or remotely and whether the equipment is serviced on site or removed to another location

Click here to enter text.

Requires that the ISSM/ISSO or designee explicitly approve the removal of the information system or system components from organizational facilities for off-site maintenance or repairs

Click here to enter text.

Sanitizes equipment to remove all information from associated media prior to removal from organizational facilities for off-site maintenance or repairs

Click here to enter text.

Checks all potentially impacted security controls to verify that the controls are still functioning properly following maintenance or repair actions

Click here to enter text.

Includes date and time of maintenance, name of individual performing the maintenance, name of escort (if appropriate), a description of the maintenance performed, and a list of equipment removed or replaced to include ID numbers (if applicable) in organization maintenance records or maintenance log

Click here to enter text.

CONTINUOUS MONITORING STRATEGY

Click here to enter text.

10.15.3MA-3 – Maintenance Tools


Recommended Continuous Monitoring Frequency: Annual

Program Frequency:

Choose an item.

Implementation Status:

 Implemented  Partially implemented  Planned

Organizational Tailoring:

 Compensatory Control (Provide justification below)  Tailored In (Provide justification below)

 Tailored Out (Provide justification below)  Modified (Provide justification below)


Control Origination (check all that apply):

 Common  System Specific  Hybrid (Common and System Specific)



The organization approves, controls, and monitors information system maintenance tools. Devices with transmit capability (e.g., IR, RF) shall remain outside the facility unless explicitly approved by the AO.

Click here to enter text.


CONTINUOUS MONITORING STRATEGY

Click here to enter text.

10.15.3.1MA-3(1) – Maintenance Tools: Inspect Tools





Recommended Continuous Monitoring Frequency: Annual

Program Frequency:

Choose an item.

Implementation Status:

 Implemented  Planned

Organizational Tailoring:

 Compensatory Control (Provide justification below)  Tailored In (Provide justification below)

 Tailored Out (Provide justification below)  Modified (Provide justification below)


Control Origination (check all that apply):

 Common  System Specific  Hybrid (Common and System Specific)



The organization inspects maintenance tools carried into a facility by maintenance personnel for improper or unauthorized modifications.

Click here to enter text.

CONTINUOUS MONITORING STRATEGY

Click here to enter text.

10.15.3.2MA-3(2) – Maintenance Tools: Inspect Media


Recommended Continuous Monitoring Frequency: Annual

Program Frequency:

Choose an item.

Implementation Status:

 Implemented  Planned

Organizational Tailoring:

 Compensatory Control (Provide justification below)  Tailored In (Provide justification below)

 Tailored Out (Provide justification below)  Modified (Provide justification below)


Control Origination (check all that apply):

 Common  System Specific  Hybrid (Common and System Specific)



The organization checks media containing diagnostic and test programs for malicious code before the media are used in an IS. If, upon inspection of media containing maintenance diagnostic and test programs, organizations determine that the media contain malicious code, the incident is handled consistent with organizational incident handling policies and procedures.

Click here to enter text.



CONTINUOUS MONITORING STRATEGY

Click here to enter text.

10.15.3.3MA-3(3) – Maintenance Tools: Prevent Unauthorized Removal (+ Classified Overlay)


Recommended Continuous Monitoring Frequency: Annual

Program Frequency:

Choose an item.

Implementation Status:

 Implemented  Planned

Organizational Tailoring:

 Compensatory Control (Provide justification below)  Tailored In (Provide justification below)

 Tailored Out (Provide justification below)  Modified (Provide justification below)


Control Origination (check all that apply):

 Common  System Specific  Hybrid (Common and System Specific)



Media without write protection that is brought in for maintenance must remain within the facility and must be stored and controlled at the classification level of the highest IS to which the media was introduced. Prior to entering the facility, maintenance personnel must be advised that they will not be allowed to remove media from the facility. If deviation from this procedure is required under special circumstances, it must be documented locally for review and approval by the ISSM/ISSO.

Each time the diagnostic test media is introduced into the facility it must undergo stringent integrity checks (e.g., virus scanning, checksum) prior to being used on the IS, and before leaving the facility, the media must be checked to assure that no classified information has been written on it. See also MP-5.

Organizations are responsible for preventing the unauthorized removal of maintenance equipment from the facility. This can be accomplished by any of the following:


  • Verifying there is no organizational information contained on the equipment.

  • Sanitizing or destroying the equipment.

  • Retaining the equipment within the facility.

  • Obtaining approval from the ISSM/ISSO explicitly authorizing removal of the equipment from the facility.

Click here to enter text.



CONTINUOUS MONITORING STRATEGY

Click here to enter text.

10.15.4MA-4 – Non-Local Maintenance (- Standalone Overlay)


After a relevance determination, this control can be tailored out for standalone IS.

Recommended Continuous Monitoring Frequency: Annual

Program Frequency:

Choose an item.

Implementation Status:

 Implemented  Planned

Organizational Tailoring:

 Compensatory Control (Provide justification below)  Tailored In (Provide justification below)

 Tailored Out (Provide justification below)  Modified (Provide justification below)


Control Origination (check all that apply):

 Common  System Specific  Hybrid (Common and System Specific)



Non-local maintenance and diagnostic activities are those activities conducted by individuals communicating through a network outside of the system’s accreditation boundary. Non-local includes devices shipped out for repair or online ‘remote’ maintenance.

The organization:



Approves and monitors nonlocal maintenance and diagnostic activities

Click here to enter text.



Allows the use of nonlocal maintenance and diagnostic tools only as consistent with organizational policy and documented in the security plan for the information system

Click here to enter text.

Employs strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions

Click here to enter text.

Maintains records for nonlocal maintenance and diagnostic activities

Click here to enter text.

Terminates session and network connections when nonlocal maintenance is completed

Click here to enter text.

CONTINUOUS MONITORING STRATEGY

Click here to enter text.

10.15.4.1MA-4(1) – Non-Local Maintenance: Auditing and Review


Recommended Continuous Monitoring Frequency: Quarterly

Program Frequency:

Choose an item.

Implementation Status:

 Implemented  Planned

Organizational Tailoring:

 Compensatory Control (Provide justification below)  Tailored In (Provide justification below)

 Tailored Out (Provide justification below)  Modified (Provide justification below)


Control Origination (check all that apply):

 Common  System Specific  Hybrid (Common and System Specific)



The organization audits nonlocal maintenance and diagnostic sessions and reviews the records of maintenance and diagnostic sessions at least quarterly.

Click here to enter text.



CONTINUOUS MONITORING STRATEGY

Click here to enter text.

10.15.4.2MA-4(3) – Non-Local Maintenance: Comparable Security/Sanitization (- Standalone Overlay)


After a relevance determination, this control can be tailored out for standalone IS.

Recommended Continuous Monitoring Frequency: Annual

Program Frequency:

Choose an item.

Implementation Status:

 Implemented  Planned

Organizational Tailoring:

 Compensatory Control (Provide justification below)  Tailored In (Provide justification below)

 Tailored Out (Provide justification below)  Modified (Provide justification below)


Control Origination (check all that apply):

 Common  System Specific  Hybrid (Common and System Specific)



If non-local maintenance is required from a service or organization that does not provide the same level of security required for the IS being maintained, the system must be sanitized (see the Media Protection (MP) section) and placed in a standalone configuration prior to establishment of the remote connection. If the system cannot be sanitized (e.g., due to a system crash), non-local maintenance is not permitted.

The organization:



  • Requires that nonlocal maintenance and diagnostic services be performed from an information system that implements a security capability comparable to the capability implemented on the system being serviced; or

  • Removes the component to be serviced from the information system and prior to nonlocal maintenance or diagnostic services, sanitizes the component (with regard to organizational information) before removal from organizational facilities, and after the service is performed, inspects and sanitizes the component (with regard to potentially malicious software) before reconnecting the component to the information system.

Click here to enter text.



CONTINUOUS MONITORING STRATEGY

Click here to enter text.

10.15.4.3MA-4(6) – Non-Local Maintenance: Cryptographic Protection (- Standalone Overlay)


After a relevance determination, this control can be tailored out for standalone IS.

Recommended Continuous Monitoring Frequency: Annual

Program Frequency:

Choose an item.

Implementation Status:

 Implemented  Planned

Organizational Tailoring:

 Compensatory Control (Provide justification below)  Tailored In (Provide justification below)

 Tailored Out (Provide justification below)  Modified (Provide justification below)


Control Origination (check all that apply):

 Common  System Specific  Hybrid (Common and System Specific)



The information system implements cryptographic mechanisms to protect the integrity and confidentiality of nonlocal maintenance and diagnostic communications. Strong identification and authentication techniques (i.e., two-factor authentication) shall be employed in the establishment of non-local maintenance and diagnostic sessions.

Click here to enter text.



CONTINUOUS MONITORING STRATEGY

Click here to enter text.

10.15.4.4MA-4(7) – Non-Local Maintenance: Remote Disconnect Verification (- Standalone Overlay)


After a relevance determination, this control can be tailored out for standalone IS.

Recommended Continuous Monitoring Frequency: Annual

Program Frequency:

Choose an item.

Implementation Status:

 Implemented  Planned

Organizational Tailoring:

 Compensatory Control (Provide justification below)  Tailored In (Provide justification below)

 Tailored Out (Provide justification below)  Modified (Provide justification below)


Control Origination (check all that apply):

 Common  System Specific  Hybrid (Common and System Specific)



The information system implements remote disconnect verification at the termination of non-local maintenance and diagnostic sessions.

Click here to enter text.



CONTINUOUS MONITORING STRATEGY

Click here to enter text.

10.15.5MA-5 – Maintenance Personnel


.

Recommended Continuous Monitoring Frequency: Annual

Program Frequency:

Choose an item.

Implementation Status:

 Implemented  Planned

Organizational Tailoring:

 Compensatory Control (Provide justification below)  Tailored In (Provide justification below)

 Tailored Out (Provide justification below)  Modified (Provide justification below)


Control Origination (check all that apply):

 Common  System Specific  Hybrid (Common and System Specific)



If appropriately cleared personnel are unavailable to perform maintenance, an uncleared or lower-cleared person may be employed provided a fully cleared, trained, and technically qualified escort monitors and records their activities in a maintenance log.

The organization:



Establishes a process for maintenance personnel authorization and maintains a list of authorized maintenance organizations or personnel

Click here to enter text.



Ensures that non-escorted personnel performing maintenance on the information system have required access authorizations

Click here to enter text.

Designates organizational personnel with required access authorizations and technical competence to supervise the maintenance activities of personnel who do not possess the required access authorizations

Click here to enter text.

CONTINUOUS MONITORING STRATEGY

Click here to enter text.

10.15.5.1MA-5(1) – Maintenance Personnel: Individuals without Appropriate Access (+ Classified Overlay)


Recommended Continuous Monitoring Frequency: Annual

Program Frequency:

Choose an item.

Implementation Status:

 Implemented  Planned

Organizational Tailoring:

 Compensatory Control (Provide justification below)  Tailored In (Provide justification below)

 Tailored Out (Provide justification below)  Modified (Provide justification below)


Control Origination (check all that apply):

 Common  System Specific  Hybrid (Common and System Specific)



The organization:

  • Implements procedures for the use of maintenance personnel that lack appropriate security clearances or are not U.S. citizens, that include the following requirements:

  • Maintenance personnel who do not have needed access authorizations, clearances, or formal access approvals are escorted and supervised during the performance of maintenance and diagnostic activities on the information system by approved organizational personnel who are fully cleared, have appropriate access authorizations, and are technically qualified;

  • Prior to initiating maintenance or diagnostic activities by personnel who do not have needed access authorizations, clearances or formal access approvals, all volatile information storage components within the information system are sanitized and all nonvolatile storage media are removed or physically disconnected from the system and secured; and

  • Develops and implements alternate security safeguards in the event an information system component cannot be sanitized, removed, or disconnected from the system.

Click here to enter text.



CONTINUOUS MONITORING STRATEGY

Click here to enter text.

10.15.5.2MA-5(2) – Maintenance Personnel: Security Clearances for Classified Systems




Recommended Continuous Monitoring Frequency: Annual

Program Frequency:

Choose an item.

Implementation Status:

 Implemented  Planned

Organizational Tailoring:

 Compensatory Control (Provide justification below)  Tailored In (Provide justification below)

 Tailored Out (Provide justification below)  Modified (Provide justification below)


Control Origination (check all that apply):

 Common  System Specific  Hybrid (Common and System Specific)



Appropriately cleared personnel who perform maintenance or diagnostics on IS do not necessarily require an escort. Organizations are responsible for ensuring maintenance personnel are familiar with organizational security procedures to assure the proper security procedures are being followed.

The organization ensures that personnel performing maintenance and diagnostic activities on an IS processing, storing, or transmitting classifying information possess security clearances and formal access approvals for at least the highest classification level and compartments on the IS.



Click here to enter text.



CONTINUOUS MONITORING STRATEGY

Click here to enter text.

10.15.5.3MA-5(3) – Maintenance Personnel: Citizenship Requirements for Classified Systems




Recommended Continuous Monitoring Frequency: Annual

Program Frequency:

Choose an item.

Implementation Status:

 Implemented  Planned

Organizational Tailoring:

 Compensatory Control (Provide justification below)  Tailored In (Provide justification below)

 Tailored Out (Provide justification below)  Modified (Provide justification below)


Control Origination (check all that apply):

 Common  System Specific  Hybrid (Common and System Specific)



The organization ensures that personnel performing maintenance and diagnostic activities on an IS processing, storing, or transmitting classified information are U.S. citizens.

Click here to enter text.



CONTINUOUS MONITORING STRATEGY

Click here to enter text.

10.15.5.4 MA-5(4) – Maintenance Personnel:





Recommended Continuous Monitoring Frequency: Annual

Program Frequency:

Choose an item.

Implementation Status:

 Implemented  Planned

Organizational Tailoring:

 Compensatory Control (Provide justification below)  Tailored In (Provide justification below)

 Tailored Out (Provide justification below)  Modified (Provide justification below)


Control Origination (check all that apply):

 Common  System Specific  Hybrid (Common and System Specific)



The organization ensures that only cleared personnel are used to conduct maintenance and diagnostic activities on an IS processing, storing, or transmitting classified information when the IS are jointly owned and that approvals are documents within MOAs.

Click here to enter text.



CONTINUOUS MONITORING STRATEGY

Click here to enter text.



Yüklə 1,92 Mb.

Dostları ilə paylaş:
1   ...   14   15   16   17   18   19   20   21   ...   29




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©muhaz.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin